This repository has been archived on 2025-09-14. You can view files and clone it, but cannot push or open issues or pull requests.
Files
common-tools-tcp-burst/src/common/xX.c
2019-07-10 17:54:02 +08:00

250 lines
7.7 KiB
C

/* $Id: xX.c 2423 2010-03-13 07:09:49Z aturner $ */
/*
* Copyright (c) 2001-2010 Aaron Turner.
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
* 3. Neither the names of the copyright owners nor the names of its
* contributors may be used to endorse or promote products derived from
* this software without specific prior written permission.
*
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
* IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
* GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER
* IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
* OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
* ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*
* xX stands for "include or exclude" which is used with the
* -x and -X flags
*
* Functions for use to process args for or check data against in
* tcpreplay/do_packets and tcpprep.
*/
#include "config.h"
#include "defines.h"
#include "common.h"
#include <stdlib.h>
/**
* returns the include_exclude_mode on success placing the CIDR or LIST in mybuf
* but on failure, returns xXError
*/
int
parse_xX_str(tcpr_xX_t *xX, char *str, tcpr_bpf_t *bpf)
{
int out = 0;
dbgx(1, "Parsing string: %s", str);
dbgx(1, "Switching on: %c", str[0]);
switch (str[0]) {
case 'B': /* both ip's */
str = str + 2;
out = xXBoth;
if (!parse_cidr(&(xX->cidr), str, ","))
return xXError;
break;
case 'D': /* dst ip */
str = str + 2;
out = xXDest;
if (!parse_cidr(&(xX->cidr), str, ","))
return xXError;
break;
case 'E': /* either ip */
str = str + 2;
out = xXEither;
if (!parse_cidr(&(xX->cidr), str, ","))
return xXError;
break;
case 'F': /* bpf filter */
str = str + 2;
out = xXBPF;
bpf->filter = safe_strdup(str);
/*
* note: it's temping to compile the BPF here, but we don't
* yet know what the link type is for the file, so we have
* to compile the BPF once we open the pcap file
*/
break;
case 'P': /* packet id */
str = str + 2;
out = xXPacket;
if (!parse_list(&(xX->list), str))
return xXError;
break;
case 'S': /* source ip */
str = str + 2;
out = xXSource;
if (!parse_cidr(&(xX->cidr), str, ","))
return xXError;
break;
default:
errx(-1, "Invalid -%c option: %c", xX->mode, *str);
break;
}
if (xX->mode == 'X') { /* run in exclude mode */
out += xXExclude;
if (bpf->filter != NULL)
err(-1, "Using a BPF filter with -X doesn't work.\n"
"Try using -xF:\"not <filter>\" instead");
}
xX->mode = out;
return xX->mode;
}
/**
* compare the source/destination IP address according to the mode
* and return 1 if we should send the packet or 0 if not
*/
int
process_xX_by_cidr_ipv4(int mode, tcpr_cidr_t * cidr, ipv4_hdr_t * ip_hdr)
{
if (mode & xXExclude) {
/* Exclude mode */
switch (mode ^ xXExclude) {
case xXSource:
/* note: check_ip_cidr() returns TCPR_DIR_C2S for true, TCPR_DIR_S2C for false
* and NOT true/false or 1/0, etc!
*/
return check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ? DONT_SEND : SEND;
break;
case xXDest:
return check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) ? DONT_SEND : SEND;
case xXBoth:
return (check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) &&
check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ) ? DONT_SEND : SEND;
break;
case xXEither:
return (check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) ||
check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ) ? DONT_SEND : SEND;
break;
}
}
else {
/* Include Mode */
switch (mode) {
case xXSource:
return check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ? SEND : DONT_SEND;
break;
case xXDest:
return check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) ? SEND : DONT_SEND;
break;
case xXBoth:
return (check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) &&
check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ) ? SEND : DONT_SEND;
break;
case xXEither:
return (check_ip_cidr(cidr, ip_hdr->ip_dst.s_addr) ||
check_ip_cidr(cidr, ip_hdr->ip_src.s_addr) ) ? SEND : DONT_SEND;
break;
}
}
/* total failure */
if (mode &xXExclude) {
warn("Unable to determine action in CIDR filter mode. Default: Don't Send.");
return DONT_SEND;
} else {
warn("Unable to determine action in CIDR filter mode. Default: Send.");
return SEND;
}
}
int
process_xX_by_cidr_ipv6(int mode, tcpr_cidr_t * cidr, ipv6_hdr_t * ip6_hdr)
{
if (mode & xXExclude) {
/* Exclude mode */
switch (mode ^ xXExclude) {
case xXSource:
/* note: check_ip_cidr() returns TCPR_DIR_C2S for true, TCPR_DIR_S2C for false
* and NOT true/false or 1/0, etc!
*/
return check_ip6_cidr(cidr, &ip6_hdr->ip_src) ? DONT_SEND : SEND;
break;
case xXDest:
return check_ip6_cidr(cidr, &ip6_hdr->ip_dst) ? DONT_SEND : SEND;
case xXBoth:
return (check_ip6_cidr(cidr, &ip6_hdr->ip_dst) &&
check_ip6_cidr(cidr, &ip6_hdr->ip_src) ) ? DONT_SEND : SEND;
break;
case xXEither:
return (check_ip6_cidr(cidr, &ip6_hdr->ip_dst) ||
check_ip6_cidr(cidr, &ip6_hdr->ip_src) ) ? DONT_SEND : SEND;
break;
}
}
else {
/* Include Mode */
switch (mode) {
case xXSource:
return check_ip6_cidr(cidr, &ip6_hdr->ip_src) ? SEND : DONT_SEND;
break;
case xXDest:
return check_ip6_cidr(cidr, &ip6_hdr->ip_dst) ? SEND : DONT_SEND;
break;
case xXBoth:
return (check_ip6_cidr(cidr, &ip6_hdr->ip_dst) &&
check_ip6_cidr(cidr, &ip6_hdr->ip_src) ) ? SEND : DONT_SEND;
break;
case xXEither:
return (check_ip6_cidr(cidr, &ip6_hdr->ip_dst) ||
check_ip6_cidr(cidr, &ip6_hdr->ip_src) ) ? SEND : DONT_SEND;
break;
}
}
/* total failure */
if (mode &xXExclude) {
warn("Unable to determine action in CIDR filter mode. Default: Don't Send.");
return DONT_SEND;
} else {
warn("Unable to determine action in CIDR filter mode. Default: Send.");
return SEND;
}
}